Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.

Employee Non-Compete Agreement

Originally Published:

Oct 2008

Employers in the IT industry often use non-compete agreements (NCAs) to protect intellectual property and prevent employees from leaving to form a competing business. NCAs are contractual agreements that restrict an employee, consultant, or other service provider from working within a certain industry, and/or for a particular company, and/or for a specified amount of time.

This document is meant to be a guideline in developing a non-compete agreement with employees.

This policy describes measures for preventing workplace violence and outlines the steps your company and staff should take if violence does occur. The download includes a PDF version, along with a Wor...

This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees conne...

Organizations are using automation to streamline business processes, expedite product development and manufacturing, and free staff from low-level repetitive tasks. This ebook looks at how automation ...

This policy offers guidelines for responding to severe weather activity and other emergencies. The download includes both a PDF version and an RTF document to make customization easier.
The Severe We...

Responses to a 2016 Tech Pro Research survey indicate that AI and machine learning will be a significant area of development for IT in the next few years. Forty-two percent of respondents, most of who...

This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political af...

Sharing the same 2U chassis as the R820 it replaces, the 4-socket R830 delivers a significant performance boost using the latest Intel Xeon E5-4600 v4 processors with high core counts and faster DDR4 ...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

IT pro Rick Vanover revamped his Visio stencil for creating device and server diagrams. Among the additions to this version are: HP ProLiant DL series serversHP ProLiant BL blade enclosuresHP StorageW...

Keeping your organization on its feet during a crisis hinges on your ability to implement the disaster recovery strategies you have in place. This may include mobilizing your emergency management team...

From implementing comprehensive business continuity strategies to securing your recovery site, managing a viable DR program is a tremendous challenge. Learn about key measures such as planning and tes...

The Windows Server 2003 Volume Shadow Copy Service offers even small IT shops a unique opportunity to back up just like the big guys. Our Windows Server 2003 disaster prevention and recovery guide wal...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

IT pro Rick Vanover revamped his Visio stencil for creating device and server diagrams. Among the additions to this version are: HP ProLiant DL series serversHP ProLiant BL blade enclosuresHP StorageW...

Keeping your organization on its feet during a crisis hinges on your ability to implement the disaster recovery strategies you have in place. This may include mobilizing your emergency management team...